# AwesomeXSS This repository is a collection of Awesome XSS resources. Contributions are welcome and should be submitted via an issue. ### Awesome contents - [Challenges](https://github.com/s0md3v/AwesomeXSS#awesome-challenges) - [Reads & Presentations](https://github.com/s0md3v/AwesomeXSS#awesome-reads--presentations) - [Tools](https://github.com/s0md3v/AwesomeXSS#awesome-tools) - [Mind maps](https://github.com/s0md3v/AwesomeXSS#awesome-xss-mind-maps) - [DOM XSS](https://github.com/s0md3v/AwesomeXSS#awesome-dom-xss) - [Payloads](https://github.com/s0md3v/AwesomeXSS#awesome-payloads) - [Polyglots](https://github.com/s0md3v/AwesomeXSS#awesome-polyglots) - [Tags and event handlers](https://github.com/s0md3v/AwesomeXSS#awesome-tags--event-handlers) - [Context breaking](https://github.com/s0md3v/AwesomeXSS#awesome-context-breaking) - [HTML context](https://github.com/s0md3v/AwesomeXSS#html-context) - [Attribute context](https://github.com/s0md3v/AwesomeXSS#attribute-context) - [JavaScript context](https://github.com/s0md3v/AwesomeXSS#javascript-context) - [Confirm Variants](https://github.com/s0md3v/AwesomeXSS#awesome-confirm-variants) - [Exploits](https://github.com/s0md3v/AwesomeXSS#awesome-exploits) - [Probing](https://github.com/s0md3v/AwesomeXSS#awesome-probing) - [Bypassing](https://github.com/s0md3v/AwesomeXSS#awesome-bypassing) - [Encoding](https://github.com/s0md3v/AwesomeXSS#awesome-encoding) - [Tips & tricks](https://github.com/s0md3v/AwesomeXSS#awesome-tips--tricks) ### Awesome Challenges - [prompt.ml](https://prompt.ml) - [alf.nu/alert1](https://alf.nu/alert1) - [s-p-o-o-k-y.com](https://www.s-p-o-o-k-y.com) - [xss-game.appspot.com](https://xss-game.appspot.com) - [polyglot.innerht.ml](https://polyglot.innerht.ml) - [sudo.co.il/xss](http://sudo.co.il/xss) - [hack.me/t/XSS](https://hack.me/t/XSS) - [root-me.org](https://www.root-me.org/?page=recherche&lang=en&recherche=xss) - [chefsecure.com](https://chefsecure.com/courses/xss/challenges) - [wechall.net](https://www.wechall.net/challs/XSS) - [codelatte.id/labs/xss](https://codelatte.id/labs/xss) ### Awesome Reads & Presentations - [Bypassing XSS Detection Mechanisms](https://github.com/s0md3v/MyPapers/tree/master/Bypassing-XSS-detection-mechanisms) - [XSS in Sarahah](http://www.shawarkhan.com/2017/08/sarahah-xss-exploitation-tool.html) - [XSS in Facebook via PNG Content Type](https://whitton.io/articles/xss-on-facebook-via-png-content-types/) - [How I met your girlfriend](https://www.youtube.com/watch?v=fWk_rMQiDGc) - [How to Find 1,352 Wordpress XSS Plugin Vulnerabilities in one hour](https://www.youtube.com/watch?v=9ADubsByGos) - [Blind XSS](https://www.youtube.com/watch?v=OT0fJEtz7aE) - [Copy Pest](https://www.slideshare.net/x00mario/copypest) ### Awesome Tools - [XSStrike](https://github.com/UltimateHackers/XSStrike) - [xsshunter.com](https://xsshunter.com) - [BeEF](https://github.com/beefproject/beef) - [JShell](https://github.com/UltimateHackers/JShell) ### Awesome XSS Mind Maps A beautiful XSS mind map by Jack Masa, [here](https://github.com/s0md3v/AwesomeXSS/blob/master/Database/jackmasa-mind-map.png) ### Awesome DOM XSS - Does your input go into a sink? `Vulnerable` - It doesn't? `Not vulnerable` **Source**: An input that could be controlled by an external (untrusted) source. ``` document.URL document.documentURI document.URLUnencoded (IE 5.5 or later Only) document.baseURI location location.href location.search location.hash location.pathname document.cookie document.referrer window.name history.pushState() history.replaceState() localStorage sessionStorage ``` **Sink**: A potentially dangerous method that could lead to a vulnerability. In this case a DOM Based XSS. ``` eval Function setTimeout setInterval setImmediate execScript crypto.generateCRMFRequest ScriptElement.src ScriptElement.text ScriptElement.textContent ScriptElement.innerText anyTag.onEventName document.write document.writeln anyElement.innerHTML Range.createContextualFragment window.location document.location ``` This comprehensive list of sinks and source is taken from [domxsswiki](https://github.com/wisec/domxsswiki). ### Awesome Payloads ``` z z z
"/ondblclick=`<`[confir\u006d``]>z click click